You are here
Home > News > Technology

Four ways network traffic analysis benefits security teams

I sat next to a head of security for a large academic institution in Eastern Europe at an event just before the pandemic shut everything down. He told me that just monitoring DNS lookups and the traffic types was his most effective way of identifying compromised devices. This article just confirms what practitioners already know. The march towards digital transformation and the increasing volume of cyberattacks are finally driving IT security and network teams towards better

Use cases for AI and ML in cyber security

A welcome dose of reality injected into the hype-stream of AI and ML...: “The algorithms embedded in many modern security products could, at best, be called narrow, or weak, AI; they perform highly specialised tasks in a single, narrow field and have been trained on large volumes of data, specific to a single domain. This is a far cry from general, or strong, AI, which is a system that can perform any generalised task and answer questions across multiple domains. Who knows h

Revolutionary quantum breakthrough paves way for safer online communication

As soon as someone uses words like 'impregnable' you know there are going to be problems. However, I give this a cautious welcome as it drastically reduces the cost of incorporating quantum techniques into existing networks...: [...] By deploying a new technique, harnessing the simple laws of physics, it can make messages completely safe from interception while also overcoming major challenges which have previously limited advances in this little used but much-hyped technolo

Smart-Lock Hacks Point to Larger IoT Problems

In my completely non-rigourous study of adoption patterns (I asked my friends, mostly people in tech/security roles), I've concluded that I'm right to be extremely suspicious of 'smart' devices. Articles like this just reinforce my world view. For the sake of full disclosure I must state that I'm working with a company that provides smart access services (not just lock/unlock but room reservations, car park slots, wifi codes, coffee, payment systems...) that is much more caut...

Developers Need More Usable Static Code Scanners to Head Off Security Bugs

My advice is to invest in your threat modelling process and tools to get a better return from 'shifting-left', especially given how unusable the lower level tools seem to be...: [...] The research comes as developers are increasingly being tasked with taking responsibility for the security of their code, often by getting earlier results of security analyses as they write their code. The simplest form of such tools are linters — named after "lint," a Unix-based code scanner...

The future of encryption: Getting ready for the quantum computer attack

If you're concerned about encrypted data being decrypted in the future by a quantum computer attack, then it's time to investigate and possibly invest in quantum secure cryptography...: [...] Kaafarani is a former engineer at Hewlett-Packard Labs and leads a team of 10 full-time quantum cryptographers, from what he estimates to be a worldwide pool of just a hundred or so. The company is busy working on the development of quantum-secure cryptography– encryption solutions for

Continuing the Mobile Device Guidance journey with Windows 10 and Android

I was talking to a client yesterday and asked how their infrastructure was coping with mass working from home. By a stroke of luck, they have moved their mail and Sharepoint to Office365 (or whatever Microsoft have decided to call it this week) ands split tunnelling on their VPN so a lot of traffic doesn't have to go in and out their gateways. The UK NCSC are now using this kind of configuration in their guidance...: [...] Managed tunnels follow this approach. By default, al

China’s secret space weapons could kill 90% of people on US mainland in ‘first strike’ EMP attack …

Something to make you calm and relaxed over your Corn Flakes. Usual warnings about hyperbole from pressure groups apply...: [...] The report by the EMP Task Force on Homeland and National Security, a coalition of industry, security and government officials, lays bare a doomsday scenario of a preemptive attack. EMPs use low-yield nuclear weapons detonated in the atmosphere to create a wave of energy that fries electronic equipment and may knock out the power grid. A cyb

Microsoft Previews Windows Defender ATP for Android

If you're not already looking at ATP to protect your endpoints and cloud assets, maybe the Linux and Android coverage might persuade you to take a look...: [...] The Linux version of Microsoft's software represents yet another move by the company to extend its tools beyond its Windows-based platforms. "This release marks an important moment for all Microsoft Defender ATP customers when Microsoft Defender ATP becomes a truly unified solution to secure the full spectrum of ...

Windows 10 June 2020 updates cause forced reboots, LSASS crashes

You might want to weigh up the security fixes in this release with the potential to cause problems...: [...] Microsoft has not yet formally acknowledged this issue (no new support document has been published or new known issues have been added to the Windows 10 health dashboard so far) and an official fix for this problem is not yet available. However, as the company explains, Redmond's developers are working on a resolution to be provided to affected customers as part of